CTYPE html>
Cybersecurity Student & DevSecOps Enthusiast
Passionate about securing cloud infrastructure, automating security workflows, and hunting threats. Currently exploring the intersection of development and security operations.
I'm a cybersecurity student with a passion for DevSecOps, cloud security, and threat detection. My journey began with a curiosity about how systems work and evolved into a mission to secure them.
Currently focused on building automated security pipelines, analyzing cloud misconfigurations, and developing backend systems with security-first principles. I believe that security should be integrated into every stage of development, not bolted on as an afterthought.
When I'm not breaking (and fixing) things, you'll find me exploring new security tools, contributing to open-source projects, or documenting my findings on my blog.
Automated security scanning pipeline integrated into GitHub Actions. Scans for vulnerabilities, secrets, and misconfigurations before deployment.
Tool that audits AWS infrastructure against CIS benchmarks and custom security policies. Generates detailed reports with remediation steps.
Real-time log analysis tool for detecting suspicious patterns and anomalies. Integrates with Splunk and ELK stack.
RESTful API with built-in security features: rate limiting, authentication, input validation, and comprehensive logging.
Automated tool for scanning container images for vulnerabilities and security best practices before pushing to registry.
Real-time dashboard aggregating threat feeds from multiple sources. Provides alerts and visualizations for security operations teams.
A comprehensive guide to implementing security at every stage of your CI/CD pipeline. Learn about secret scanning, dependency checks, and automated security testing.
Updated security practices for AWS cloud infrastructure. Covers IAM policies, encryption, network security, and compliance automation.
Introduction to threat hunting using SIEM tools. Learn how to write effective queries, detect anomalies, and respond to security incidents.
Deep dive into container security covering runtime protection, network policies, and Kubernetes security best practices.
Practical guide to implementing robust API security including JWT authentication, OAuth 2.0, and effective rate limiting strategies.